Thursday, September 3, 2020

Family groupings Essay

1. â€Å"Many little youngsters go through more waking hours with parental figures than they do with their essential families† (Swim and Watson, 2011, p. 16). In view of the data introduced on pages 9-21 of your course text, clarify how the mix of family groupings, progression of care, essential providing care, and rich organizations with families upgrade solid newborn child advancement and learning with regards to baby care. It is significant that a baby builds up a relationship with in any event one essential guardian for social and enthusiastic advancement to happen typically. The connection hypothesis recommends that newborn children, little children and grown-ups need time to make positive enthusiastic bonds with each other. The progress among home and school ought to be smooth and consistent. The main pathway for accomplishing that is through cooperating with families. Perceiving, supporting, and using this can altogether improve your viability as a parental figure and t eacher (Swim and Watson, 2011). 2. Formatively fitting practice in baby settings requires understanding the bidirectional and equal connection between the kid and their condition. In view of Chapters 1 and 2 of your course text, give an aggregate of three instances of bidirectional and corresponding connections that exist between newborn children, families and kid care settings. In view of these models, depict the job newborn child settings can play in supporting baby and family improvement. Three instances of bidirectional and complementary connections are physical, passionate and social language. There is an expanded requirement for educator instruction, parent training, including legitimate determination of care settings, imaginative and youngster focused practices, for example, progression of care, compelling utilization of assets. The job baby settings can play in supporting baby and family advancement is it is significant for the essential parental figure to comprehend that even babies have a section in their own development and improvement. Newborn children have their needs, needs and wants and they should be regarded (Swim and Watson). 3. â€Å"A socially rich educational plan supports the acknowledgment of social contrasts and enables youthful families to associate with the conventions of their legacy and culture† (Swim and Watson, 2011, p. 21). In light of the conversation of social models introduced on pages 21-23 of your course text, clarify the job of the newborn child guardian in giving a socially rich educational program. A socially rich educational program energizes the acknowledgment of social contrasts and enables youthful families to associate with the conventions of their own legacy and culture. Newborn child parental figures perceive the extravagance and openings accessible so as to work with groups of different ethnic, racial and social gatherings (Swim and Watson). The baby guardian needs what we as a whole need and that is upbeat, solid and effective kids. Sorting out and continuous reflection upon what guardians enlighten us regarding their methodologies can assist us with finding their soci al model for providing care, and afterward contrast it and the social models that control our own training (Watson, 2011).

Saturday, August 22, 2020

Steven Spielberg :: Essays Papers

Steven Spielberg Steven Spielberg is an American movie chief, maker and official, who has made incredible business progress and is among the most well known producers of the late twentieth Century. Spielberg made his first film at 12 years old. In 1969, his short film â€Å"Amblin† went to the consideration of Universal Pictures and he marked a seven-year contract with them. His soonest business endeavors were TV films, which incorporated the f m â€Å"Duel† made in 1971, and which picked up him more extensive acknowledgment. In 1975 Spielberg made the film â€Å"Jaws†, a spine chiller dependent on Peter Benchley’s epic about an incredible white shark. â€Å"Jaws† end up being an enormous achievement and immediately settled Spielberg’s notoriety and acclaim. After this, with just hardly any special cases, pretty much every movie that Spielberg has taken care of has become a film industry hit, and he has been progressively viewed as a producer of certifiable imaginative capacity. Ensuing movies have included â€Å" Close Encounters of the Third Kind†(1977), â€Å"1941†(1979), â€Å"Raiders of the Lost Ark†(1981) and it’s continuations: â€Å"Indiana Jones and the Temple of Doom†(1984) and â€Å"Indiana Jones and the Last Crusade(1989), additionally â€Å"E.T.† (1982) which has been said to have been his most prominent accomplishment, â€Å"The Color Purple† (1985), â€Å"Empire of the Sun†(1987), â€Å"Always†(1989) and â€Å"Hook†(1991). In 1993 Spielberg discharged two movies that had huge business and creative effect. â€Å"Jurassic Park† including PC createad dinosaurs, which inside about a month of it’s discharge turned into the top-netting movie up to that time. He als discharged â€Å"Schindlers List†, an epic of the Holocaust, this demonstrated him to be an executive of grear force and affectability, he got an institute grant for best chief and best picture. In 1987 he had gotten the Irving Thalberg Award. In 1994, with Jeffrey Katzenberg and David Geffen, Spielberg framed another studio, Dreamworks SKG, they likewise annouced the development of an innovative association with Microsoft Corporation - Dreamworks Interactive - to create intelligent games, recordings a instructing materials.

Friday, August 21, 2020

Bank of England Essay Example | Topics and Well Written Essays - 1250 words

Bank of England - Essay Example This paper features that it the hour of the monetary emergency, banks will in general raise the loan fee to demoralize speculators from getting cash that is because of investors. Yield bends are utilized to anticipate the progressions in financial yield and its general development. The line plots the loan costs at a given point in time of bonds having comparative credit quality however varying in their development period. As the paper traces the shape emerging from the yield bend is huge to the speculators as it helps give a thought of what the future loan fees change and the difference in the monetary condition of the nation. Yield bends are of three kinds; Under this sort of bend securities with a shorter-term development period will regularly yield higher than securities with longer-term development period, which will in general have lesser returns, this can be an indication of the up and coming downturn. At the point when the yield bend is level, it implies that shorter-and longer-term yields are moderately near one another as far as their yield; this can be a forecast of a financial change. The angle of a yield bend is a critical factor to speculators; the greater the inclination of the yield bend, the greater the distinction among short-and long haul paces of come back to investment.The UK government is reasonable to take note of the obligation of the economy. The risk ostensible yield bends are recovered from UK overlaid costs and General Collateral (GC) rates and the UK file connected security costs. Overlaid edged protections are Foreseeable and ensured for a future compensation by the Government to the holder of the plated. The installment is made in a fixed money installment (coupon) semi-every year until the development date. At development, the holder gets the last coupon installment and the head. Record connected plated is proposed to:

Friday, June 12, 2020

Facebook and Twitter have been Affected Negatively - 1375 Words

Facebook and Twitter have been Affected Negatively by Most of Challenges (Essay Sample) Content: EducationNameInstructorCourseIntroductionThe social media business has flourished greatly in the recent years attracting several national and international companies into its market, great companies such as Facebook, Twitter, Skype, Linked in among others have grown from simple enterprises to multi-national conglomerates commanding millions of followers world-wide, although the success experienced in the social media industry doesnà ¢Ã¢â€š ¬t come without its challenges.Some of the challenges includes; user resistance, difficulty in the translation process of popularity among its users into equally measured great profits, external interference from issues such as legal regulations, stiff competition from other social media companies offering similar products and services, high cost of investment in terms of incorporating new technology in the business and finall y demeaning regulatory hurdles geared towards protecting personal user data, (Morrison, J (2011) à ¢Ã¢â€š ¬Ã‹Å"The rise of the social web sees Facebook soar in popularityà ¢Ã¢â€š ¬ in The Global Business Environment: Meeting the Challenges. 3rd edn. Basingstoke: Palgrave Macmillan, 4-5). Among other major challenges are involvement of much innovation that commands much funding and capital as compared to the revenues in expectation, some of these innovations are capital intensive, they require highly skilled manpower and high level of creativity which is rather too costly to obtain without certainty of good returns financially. There has been lack of entry restrictions in the social media business, issues that has brought negative impact on the competition aspect of the business making it stiff and cut throat, customers have lacked ability to make choices on whom to buy from making the whole business a more crowded business platform.( By MarcusCasalPublishedMay29,2013 /customer-experience/3-challenges-facing-social-media-crm-managers-0507394#U46jbu7Y8lIRXwDD.99)Facebook and twitter have been affected negatively by most of these challengesbut specifically has its setback such as; Facebook or twitter fatigue syndrome, lack of a independent social search with all functional search requirement which should provide a wide scope of networking, excessive control by the advertising fraternity making them more of a business oriented platform than just social platforms.The global business environment has not been too friendly to both Facebook and twitter, they have struggled to remain relevant in the social media business despite all the hurdles involved in the business, investors have pumped in sums of money into them in the recent years in await of positive re turns without taking into considerations numerous challenges experienced in the sector. Both Facebook and Twitter operates on the same business platform with almost similar functions and target groups. their challenges are almost the same, they have faced hard times to survive smoothly in the global business environment despite being multi-national business companies, there are challenges in meeting the speedy globalization expectations which are linked to high speed communication, effectiveness and accuracy in handling global business, financial, social, military among other issues.( The Global Business Environment: Meeting the Challenges. 3rd edn. Basingstoke: Palgrave pg 39-42, pg 193-206, pg 392-400)They have failed to translate their popularity and high number of followers into financial returns inform of profit and dividend to its customers and shareholders, a issues that has sparked a great uproar in great investors summits, for instance Facebook holds huge amounts of customer personal information which is easily accessed worldwide by all its users.Facebook and Twitter have failed to meet the privacy requirements of its user data ending up into allowing personal user data to be viewed publically. This is a great breach of the privacy regulations and rules leaving users with the option of choosing to restrict the access, with Mark Zuckerberg having to say that à ¢Ã¢â€š ¬Ã‚ privacy is no longer a social normà ¢Ã¢â€š ¬Ã‚ (The Telegraph, 2010).Countries differences in monetary systems, law and regulations governing international businesses, tax rules and other regulatory requirements has been a great setback for the social media business .Cost of opening support centers vary from one state to another making the profit margins to drift low, the individual country relationship with the global economy also has negative impact when it come to the comparison of greater economies and the second world economy countries.( -strategist.com/blog/2008/08/07/the-ma0ny-challenges-of-the-social-media-industry/ Posted on August 7th, 2008)Social and cultural environment in which the two social media businesses operates also create a different challenge to the smooth running of the business, different ethnic and cultural norms regulates the usage of the sites, this brings in the aspect of the language barrier, Facebook and Twitter main platforms are greatly in English, making it a extra expense to try cater for other languages in the world population adding up into the capital and expense side, religion has been a major setback in some communities whose beliefs and cultural theories contradicts with the sole p urpose and functions of social media business, societal norms and regulations have been hard to break and allow users to enjoy Facebook and twitter in such a free and satisfying environment. Global issues of financial market, technology and innovation has dragged behind progress in the social media business, Facebook and twitter employ high modern technology highly skilled labor which are highly capital intensive, this has resulted to massive investment into the innovation without assurance of profitable returns, the technology world is growing at a high speed necessitating continuous invention and innovation ,this has been brought about by limited restrictions in the market resulting into a throat cut competition business environment. , (Mark Sweney The Guardian, Sunday 26 June 2011 22.30 BS)Despite all these challenges accrued to the social media business, Facebook and twit ter have the initiative to employ several remedies to make sure they remain relevant, resourceful and profit making in their market, some of the remedies are short term while as others are long term resolutions all aimed at boosting the reputation and the protecting investors input. A proper mechanism has to be put in place to deal with the legal restrictions on both the customer use and business operations in different countries, incorporation of basic cultural, societal and country norms in the business platform can see the customer base and access be boosted to better levels, better and secure means of safeguarding customer data must be formed with clearly stipulated directions to the customers to avoid confusion, complication or any difficulty in making ones information secure and private, entry regulations and restrictions are supposed to be arrived...

Sunday, May 17, 2020

Types Of Attacks On A Computer System - 1546 Words

Different Types of Attacks on Computer Systems What is attack on a Computer Systems? Attack on a systems or network is defined on your network infrastructure. Attacker will first analyse network environment and collect information in order to take advantage of the existing open ports or vulnerabilities. It may include unauthorized access to company’s resources. Passive attack - In some cases, the purpose of attack is only to learn and get some information from your computer system and your computer system resources are not manipulated or disabled in any way, then it is called Passive attack. And it is hard to detect that someone is monitoring you because you will not see any changes in your system. Active attack - Active attack occurs where the attacker accesses and either alters, disables or destroys your information or data. Attack can be happened either from outside of the organization means Outside Attack or someone from within the company who is an insider that already has access to the network which is called Inside Attack. Some of the attacks will be attacks targeting the end-users like Phishing or Social Engineering, those are usually not directly called as network attacks. Methods of attacks These are the methods that can be used to make an attack on a computer system. Distributed attack - A distributed attack are very strategic attacks. It requires particular code such as a Trojan horse or back-door program, to a trusted software that so, with thatShow MoreRelatedTypes Of Attacks On Computer System3184 Words   |  13 PagesDifferent Types of Attacks on Computer System Introduction A PC attack may be characterized as activities coordinated against PC frameworks to disturb gear operations, change transforming control, or degenerate put away information. Any PC joined with a figuring system is possibly helpless against an assault. An assault is the misuse of an imperfection in a processing framework (working framework, programming system or client framework) for purposes that are not known by the framework administratorRead MoreVarious Types Of Attacks On The Computer Network System1844 Words   |  8 PagesThesis Statement 3 Various Types of Attacks on the Computer Network System 4 Direct Attacks 4 Indirect Attacks 4 Effective Database Security Techniques 5 Security through Cryptography 5 Security through Access Control 6 Security through Steganography 6 Security through data scrambling 7 Security through Miscellaneous Techniques 7 Conclusion 8 References 9 The Security Of Database Introduction In the contemporary times, it has been widely believed that the huge computer network platform is consideredRead MoreInternet Security Threats Essay1622 Words   |  7 Pagesscanner attacks, DOS(denial of service) attacks, spider attacks, worms and socail attacks. Also, I will cover different security practices and computer software and hardware that can help protect and prevent these different attacks on your computer, or network. Many people use the words virus, trojan, and worm interchangeably when talking about attacks on their computer, but in reality, they are different types of attacks, this paper will define and differentiate between the different types of attacksRead MoreTypes of Access Attacks1268 Words   |  5 PagesTypes of access attacks †¢ Password attack †¢ Trust Exploitation attack †¢ Port Redirection attack †¢ Man-in-the middle attack Password Attacks: Network intruder or attacker uses packet sniffer tools to obtain user accounts and passwords information. Password attacks can also be referred to as dictionary attacks or brute force attacks. Attacker repeatedly attempts to log in to an organization shared resources or gaining unauthorized access to an organization network, attacker use tools like CAIN to doRead MoreEssay Intrusion Detection Systems1607 Words   |  7 PagesDetection Systems In 1980, James Anderson’s paper, Computer Security Threat Monitoring and Surveillance, bore the notion of intrusion detection. Through government funding and serious corporate interest allowed for intrusion detection systems(IDS) to develope into their current state. So what exactly is IDS? An IDS is used to detect malicious network traffic and computer usage through attack signatures. The IDS watches for attacks not only from incoming internet traffic but also for attacks thatRead MoreE Mail Bombing Attacks Are Just As They Sound1517 Words   |  7 PagesE-mail bombing attacks are just as they sound. Sometimes referred to as email flooding, an attacker sets up an algorithm to send â€Å"a large amount of emails simply fill up the recipient s inbox† (Goutam 15). Such attacks are designed to crash personal computers and/or the servers they are running on, given the computer is in an office. Attacks are done in one of two ways, the attacker makes a virus that uses ot hers emails to target a specific email, or the attacker simply runs an algorithm off theirRead MoreThe Effect Of Computer Vandals1430 Words   |  6 PagesDeacreased Privacy 2 Types of Security Attacks 3 Definitions 3 Hacker Attacks 4 Ways to Prevent Security Attacks 5 Introduction SUMMARY: This report will cover some of the different types of viruses and people who create them (hackers). The research and studies carried out by child organizations and authorities has been analyzed thoroughly and their records have been included in this report. The report will discuss the effects of computer vandals, how the user’s computer can be remotely attackedRead MoreCyber Attacks, Intrusion Attacks And Network Attacks1285 Words   |  6 Pagesdifferent types of attacks that their organization faces. Some of the attacks include cyber- attacks, intrusion attacks, network attacks, and social engineering attacks. This paper will present research and comparison of methods of cyber-attacks, intrusion attacks and network attacks. Comparison of Cyber-Attacks, Intrusion Attacks, and Network Attacks Cyberterrorism, cyber campaigns, and cyber-warfare are all considered forms of cyber-attacks. Therefore, the spectrum of cyber-attacks will employRead MoreComputer security is very essential to proyect against the threats caused to computing system which800 Words   |  4 PagesComputer security is very essential to proyect against the threats caused to computing system which happen because of its vulnerability. Threat to computing security takes place by a person, event or circumstance may be intentionally for sake of finance or unintentionally by deleting some of the important data. A threat agent depends on method, opportunity and motivation. Method is a knowledge to attack , oppurtinity to access the necessary information and motive behind the aatack. In olden daysRead MoreAdware1371 Words   |  6 Pagesperson. Attack | An attempt to exploit a vulnerability of a computer or network component Backdoor | An undocumented and often unauthor- ized access method to a computer resource that bypasses normal access controls. Black-hat hacker | A computer attacker who tries to break IT security for the challenge and to prove technical prowess. Cookie | A text file sent from a Web site to a Web browser to store for later use. Cookies contain details gleaned from visits to a Web site Cracker | A computer attacker

Wednesday, May 6, 2020

Learning Principles Classical Conditioning And...

Reading skills are essential to learning all other subjects taught in school. The sharper the reading skills children have and the earlier they accumulate them will determine how rapidly and how well they will achieve in school. That is why it is very crucial to get students motivated to read at a young age. Research has consistently shown that children who are exposed to reading or who read regularly gather long term benefits such as better academic performance, a mastery of language, better communication skills and more logical thinking, Nevertheless many parents struggle with generating ideas to encourage or motivate their children to read. There are three learning principles that can be used to help parents help their children get motivated to read. Those learning principles are Classical Conditioning, Operant Conditioning and Observational Learning. Classical conditioning is the association of two stimuli and thus we learn to anticipate events. Classical conditioning is a learning procedure that involve reflexes. Reflexes consist of the following: Unconditioned Stimulus (US) a stimulus that evokes an unconditioned response without any prior conditioning. Unconditioned Response (UR) an unlearned response to an unconditioned stimulus that occurs without prior conditioning. Neutral Stimulus(NS) which is a stimulus that produces no specific response. Conditioned Stimulus (CS) is the neutral stimulus after it has acquired the ability, through conditioning, to elicit aShow MoreRelatedObesity Is Popular Modern Society1579 Words   |  7 Pagesillness. Thus, it is of great importance in modern society, for both children and adults. There are three main types of learning principles, known as classical conditioning, ope-rant conditioning and observational learning. Each of them plays an important role in shaping diet. This essay mainly talks about the importance of dietary in modern society and application of learning principles in shaping diet. Dietary is of great importance in modern society, for both children and adults. It offers effectiveRead MoreLearning Experience Paper : Smoking Cessation Essay1185 Words   |  5 Pages Learning Experience Paper: Smoking Cessation Throughout one’s lifetime, an individual undergoes a magnitude of various learning experiences, all of which serve as a shaping agent, consequently forming personality traits that are unique to each human being. Examining this fact further, what does learning mean, precisely? Namely, the definition of learning is the resulting change in behavior or knowledge that occurs through experienceRead MoreApplying Operant Conditioning to Human Behaviour Essay591 Words   |  3 PagesApplying Operant Conditioning to Human Behaviour Operant conditioning is when a way of learning by consequence. To put it basic, an action which is rewarded is more likely to be repeated, along with an action that is punished is less likely to be repeated. To apply this to an example of human behaviour, young children may have shaped behaviour due to operant conditioning; where desireable behaviour is rewarded (e.g. by giving a toy) the behaviour is being positivelyRead More The Process of Learning Essay1107 Words   |  5 PagesLearning Learning is more than a person sitting at a desk and studying off a book. Everything that we do is a result of what we have learned. We respond to things that happen to us, we act and experience consequences from our behavior, and we observe what others say and do. Psychologists explain our many experiences with basic learning processes. â€Å"Learning is a relatively permanent change in behavior that occurs through experience (Santrock, p.146).† By learning how to use a computer you willRead MoreLearning: Classical Conditioning1132 Words   |  5 PagesLearning Learning is more than a person sitting at a desk and studying off a book. Everything that we do is a result of what we have learned. We respond to things that happen to us, we act and experience consequences from our behavior, and we observe what others say and do. Psychologists explain our many experiences with basic learning processes. Learning is a relatively permanent change in behavior that occurs through experience (Santrock, p.146). By learning how to use a computer youRead MoreEssay on Behavioral Learning Theories887 Words   |  4 PagesBehavioral Learning Theories Most theorists agree that learning occurs when experience causes a change in a persons knowledge or behavior . Behaviorists emphasize the role of environmental stimuli in learning and focus on the behavior, i.e., an observable response. Behavioral theories are based on contiguity, classical and operant conditioning, applied behavior analysis, social learning theory and self-regulation/cognitive behavior modification. Early views of learning were contiguityRead MoreSimilarities Between Pavlov, John B. Skinner And Classical Conditioning1316 Words   |  6 PagesThese men played a huge part in exploring the process of learning. While Watson and Pavlov focused on classical conditioning, Skinner worked with operant condition, and Bandura experimented with observational learning. All in all, these psychologist discovered many things about the process of learning, many of which I can apply to my own life experiences. Ivan Pavlov spent most of his time studying classical conditioning, a type of learning in which one learns to link two or more stimuli and anticipateRead MoreLearning Experience Paper1290 Words   |  6 PagesIn this paper I will discuss my learning experiences and analyze them with the perspective of learning theories. I will analyze my learning experiences with regards to classical conditioning, operant conditioning and cognitive- social learning theory. First of all, I would begin by describing my experience of learning to fear lizards with regards to classical conditioning. To give some context to the situation, I was raised in India where lizards, usually in large numbers, are often found on wallsRead MoreDifference Between Classical Conditioning And Observational Learning Essay1825 Words   |  8 PagesDistinguish general differences between principles of classical conditioning, operant conditioning, and observational learning (e.g., contingencies) Classical conditioning is the repeated association of an unconditioned stimulus with a neutral stimulus making it into a conditioned stimulus. Classical conditioning deals with unconditioned stimulus that produces an automatic response or unlearned (UCS/US), unconditioned response that is an automatic or unlearned response that is produced by and unconditionedRead MoreThe social learning theory proposed by Albert Bandura has become one of the most influential2500 Words   |  10 PagesThe social learning theory proposed by Albert Bandura has become one of the most influential theories of learning and behaviour. The theory added a social element, arguing that people can learn new information and behaviors by watching other people. Known as social learning theory or modeling, this type of learning can be used to explain a wide variety of behaviors. The social learning theory does not explain all learning and behaviour, it fails to account for biological and innate behaviours such

Internet Banking in India free essay sample

The banking sector in India has undergone a rapid transformation. Almost a decade ago this area was limited to nationalized banks and cooperative. Then came the multinational banks, but were these limited to serve small elite.  One could consider the past as the Middle Ages in the banking sector, in which each branch of the same bank acted as independent information silo and multichannel banking (ATMs, Net Banking, tele-banking, etc) was almost nonexistent. The main reason for this first transformation is due to improved methods developed encryption security and Internet. The second reason is that banks do not want to lose a potential market share for banks that are quick to offer their Internet services. The objective of this research is just comparing the modern era banking system with the old one. The evolution of modern banking technology began with the use of advanced machines shipping Ledger (ALPM) in the 1980s. The Reserve Bank of India, which is a central policy under which several public sector banks, financial institutions, NBFCs etc. working in India had advised then all banks to go massive computerization branch level. Two options were raised i. e. either to automate the front office or office. Many banks opted for ALPM office automation in the first phase. Banks as State Bank of India, a public sector commercial bank, focused on automating back office in branch level. The Rangarajan Committee 1985 report said the banks had to get computerized. The second wave of development called for Total Bank Automation (TBA) in late 1980. This automated both the front-end and back-end operations within the same branch. TBA compound total automation of a particular branch with its own database. In the third wave, the new private sector banks entered the field. These banks have opted for a different model of having one central database instead of having multiple databases for all branches. This was possible thanks to the availability of good network infrastructure. In the beginning of the 1990s, the cost of the leased line goes down. The DoT was expanding its capacity and new technologies were being implemented. Earlier, banks were unsure of directing the whole operation through a single data center. However, when a couple of private sector banks implemented efficiently, other banks began to show interest, and also began consolidating their databases in a single database [8]. Banks follow this movement by choosing appropriate application software that supports centralized operations. The fourth wave began with the evolution of ATM delivery channel. This was the first stage of training the client for their own transactions. The second stage was Suvidha experiment in the city of Bangalore in India. This showed the power of technology and how the scope can be increased at a rate unusually large. Seeing this, all banks began to renew their retail distribution channels. Their main focus became the number of customers they can service at a lower cost. The main channels are chains such as Internet banking and mobile banking. After this came alliances for payment through different gateways. The third major event happening now is the real time gross settlement system of the RBI. Once this is in place, transactions between banks can be done through the settlement system, online, electronically. So collections will become very fast. Within five years, most transactional services are provided by way of the Internet. Net-based banking takes only 10 percent of the operating costs of conventional banking practices and services. Because banks will play a key role in terms of public services related to electronic money transactions we feel that cooperative banks NET-Banking should consider in a big way. A cost comparison study by IBM Global Services Consulting Group clearly shows the advantage of using Internet for banking services through another Traditional media. The opening of the Indian banking sector to private players acted as a turning point for the transformation. De-regulation efforts led many financial institutions (such as HDFC and ICICI) and non-financial institutions entering the field of banking. With the entry of private players in retail banking and with multinationals focuses on individual consumers in a big way, the banking system experienced a change a phenomenal. Multi-channel banking gained importance. For the first time consumers have the option conducting transactions in either the traditional way (through the bank branch), through ATMs, by phone or through the network. Technology played a key role in providing this multi-platform service. Input private actors driven patterns combined with new nationalized banks forced to redefine their core banking strategy. And technology is central to this change. Internet Banking is the most effective means of banking. The bank customers changing relationships significantly, open standards replace property front ends, many-to-many substitution networks single line, links and traditional locking erosion, so that corporations enjoy lower switching costs. Corporations source worldwide and find the best cane. Corporate customers are free to disaggregate their corporate banking shopping, selecting the best genetics for every need, geographic and functionally, and the integrated use of front-end to manage the complexity of multiple vendors. Methodology: Let us now compare the IT journey of two of the leading banks of india i. e. Pnb and hdfc. Punjab National Bank Punjab National Bank (PNB), a public sector commercial bank, has come a long way since March 2000, when IT systems are deployed only 500-odd branches, and was very uneven. Only 35 percent of the bank business was computerized and a number of small software packages running on independent PCs. Now 2003, GNP had 101 branches in a WAN, deployed core banking infrastructure and network works 175 ATMs. It has also deployed a reliable security infrastructure that helps make transactions within its carefree branches. The journey does not end here, but along the way banks gathered valuable knowledge and experience. Some of the preconditions were that the RBI systems must be audited by an independent auditor, and an independent agency should carry authentic out penetration tests. The bank has already had their systems audited by an external agency, and penetration testing process is ongoing. In the process, GNP has developed the skills of its own staff to take charge of security on their own at a later stage. The bank also hire technically trained personnel to provide the necessary knowledge base. With the launch of Internet banking, the bank will also strengthen its security policies. A private sector bank had a centralized IP-based network right from its inception. All branches throughout the country converge at their respective location zonal center, which in turn connects to the data center Mumbai. Based on the nature of the entity and spoke network architecture, the branches are distributed in different regions and each position has an important regional center. Falling branches under a location connected to the hub in the main area. These hubs then connect to the central site (data center) using a combination of 2 Mbps tubes and 64 Kbps, depending on the total volume of transactions passing through. A highlight of HDFC Bank Network is the presence of two or more hubs in one place. Pre-Internet banking A security issue during the pre-Internet has more to do with the internal activities of a company. From the early days as technology solutions for banking applications mainframe, AS400 or Unix- had a lot of security built. Transactions that are directed from the branch to the main server is encrypted no individual passwords and many functions have two levels of authorization. Therefore safety banking largely integrated in the software or the application itself. Today banking in India is not limited to a branch. People have less time to devote to their banking and would like to make use of banking services through other channels. In a competitive market, where services offered command market share, banks are constantly competing for customers. Banking has become a process of choice and convenience. By offering different channels until banks have succeeded in divert their operations from one branch to other channels. The result has been a reduction in the cost per transaction at the branch. An average transaction costs about 100 rupees branch, at an ATM in question Rs. 0, and the Internet is around Rs. 20. But unfortunately a very small percentage of customers out not use the Internet Banking in India. This is due to factors such as low PC penetration, and penetration of Internet itself is low. At present only a few banks (eg HDFC, PNB, etc) have demonstrated the Internet initiative banking and have a strong advantage over other banks through a large number of customers still use ATMs. Typically 55 percent, on average, the operations of these banks are in the ATM, branch 30 percent, 8 percent Phone and 7 percent Internet. As with any new technology issue new face. There are a number of problems faced by these banks. One of the first problems is that of customer service. Banks need to create a whole new customer relations department to help customers. Banks need to ensure that customers receive help quickly if they need help. The major problems or disasters can destroy banks reputation quickly and easily. By showing the customer that the Internet is reliable they are able get the client can trust the online banking more and more. Besides these the first is the main concern of the laws. While Internet banking has no national or state borders, the law does. Companies will have to make sure you have the software in place that can detect when a law of a state to another is being violated. Security of course, is a big problem with banks. Along with security problems and manage cryptographic a bank also has to worry about becoming a far too cold for the customer. Some think the banks offering Internet banking services our increasingly cold and impersonal with customer. Despite the problems that exist however, are not as bad as you think. With encryption and security technology to improve in leaps and with banks and financial institutions are allowed to use 128-bit Internet banking is increasingly Code secure. The future of modern banking integration is, as people have less time for banking. My profile revealed that the banks that offer online banking services are rapidly becoming the choice of citizens in the urban areas. People want to process more transactions online. Soon there will be more activity in terms of applications and services on mobile. Geography is not an inhibitor more, since all can run on the network. Integration will become the next big thing in real. The customer will want a one-stop workshop that will take care of all your needs. For example people will want to buy their mutual funds, redeem his mutual funds, insurance policies buy, renew policies, and buy movie tickets, train tickets and numerous similar transactions through the bank. The ATM still serve as an effective means of dispensing, but the Internet and mobile will be very active. Banks that use the Internet banking have higher rates of return deposits and provide higher interest rates in general, and not have to deal with cashiers, branches, etc. and then in the times ahead and the actual Virtual banks will not dominate the future.